1
0
mirror of https://github.com/biergaizi/codecrypt synced 2024-06-16 03:48:19 +00:00
Commit Graph

461 Commits

Author SHA1 Message Date
Mirek Kratochvil
36b68d90c1 std namespace cleaning 2013-06-21 20:35:59 +02:00
Mirek Kratochvil
79c4ea8e93 interesting papers 2013-05-27 18:26:24 +02:00
Mirek Kratochvil
1a2d25e555 main: correct licensing information 2013-05-27 18:23:20 +02:00
Mirek Kratochvil
f0412c9eb4 version bump 2013-05-25 22:26:52 +02:00
Mirek Kratochvil
9c9e49ae7b fmtseq: forgotten include 2013-05-25 20:03:42 +02:00
Mirek Kratochvil
9a268d231b forgotten styleup 2013-05-25 19:27:49 +02:00
Mirek Kratochvil
d8a284fe4a upgrade docs after algo names changed 2013-05-25 19:27:22 +02:00
Mirek Kratochvil
b5ae7ca4dd algos_sig: added H=20 fmtseq variant
...that provide around 1 million signatures per key. That seems more
than sufficient for human usage.

Note that generating the key takes 16 times longer than for already
present algorithms (that have H=16). On my computer, it is around 4
minutes for fmtseq128N20 and 16 minutes for fmtseq256N20.
2013-05-25 19:19:22 +02:00
Mirek Kratochvil
0980ee827a sha2: fix the ugly warning
memcpy() is better than dereferencing a type-punned-pointer for
simulating memcpy()
2013-05-25 18:56:07 +02:00
Mirek Kratochvil
7270e90cf1 manual page 2013-05-25 18:52:27 +02:00
Mirek Kratochvil
18449bdc8a arcfour: greatly increase discard parameters
Okay, this thing got public so it's time to make the RC4 rugged. Not
that I'd know about something that would break current implementation,
but it's nice to at least do the recommended discard correctly.

We'll probably be adding better symmetric ciphers anyway.

Note that this is an incompatible change (again). FMTSeq private keys
will need to be replaced. Existing signature validity doesn't change.
Encrypted messages will not be possible to decrypt.
2013-05-25 17:13:33 +02:00
Mirek Kratochvil
deb52397a3 version bump 2013-05-18 10:57:34 +02:00
Mirek Kratochvil
8c185c51ad mce_qd: compute check matrix on the fly
codecrypt is usually invoked only with one prepare() and decrypt(), so
this basically saves several megs of memory and cuts needed computation
time in half.
2013-05-18 10:52:57 +02:00
Mirek Kratochvil
79b17b8724 polynomial: degree computation dumbness reduced 2013-05-18 10:52:12 +02:00
Mirek Kratochvil
be13fe8dca gf2m: lowlevel speedups 2013-05-18 10:51:47 +02:00
Mirek Kratochvil
1ef1b4277b ios: don't print unnecessary newlines 2013-05-18 09:21:49 +02:00
Mirek Kratochvil
105a7731d3 bvector: massive ranking/unranking speedup 2013-05-18 09:08:24 +02:00
Mirek Kratochvil
456718e301 bvector: unranking fixed 2013-05-17 15:18:25 +02:00
Mirek Kratochvil
3f73ba54c4 algos_enc: use faster unranking for decryption 2013-05-17 15:16:42 +02:00
Mirek Kratochvil
93d6cccd4f algorithm: remove identification
it's gonna be used some other way
2013-05-03 14:42:58 +02:00
Mirek Kratochvil
c18f9399a6 version bump
and some cleaning stuff
2013-05-03 14:38:21 +02:00
Mirek Kratochvil
63d51911f9 algos_enc: also pad beginning of the message
to avoid possible known plaintext attacks on the symmetric cipher when
beginning of the ciphertext is known (which is a common situation, e.g.
when sign+encrypting)
2013-05-03 14:26:00 +02:00
Mirek Kratochvil
bf14ac95ad tiger: header file astyled 2013-05-01 16:48:29 +02:00
Mirek Kratochvil
1553c09d20 algos_enc: mceqd192 variant to match fmtseq192 2013-05-01 16:44:31 +02:00
Mirek Kratochvil
24bd5bd185 algos_sig: new support for fmtseq192
It's quite rational to have such algorithm. 256-bit security is usually
an overkill, and this has two times smaller signatures (around 9.5kB) is
_so_ much faster. Use it.
2013-05-01 16:25:37 +02:00
Mirek Kratochvil
9b101c9548 tiger: added tiger192 hash func 2013-05-01 16:11:45 +02:00
Mirek Kratochvil
b087848a2f sha_hash: also wrapped sha384 2013-05-01 15:49:40 +02:00
Mirek Kratochvil
805a275df7 main: some clarifications 2013-04-27 00:56:34 +02:00
Mirek Kratochvil
6e3bfbe6d3 actions: fix renaming pubkeys 2013-04-23 21:00:41 +02:00
Mirek Kratochvil
542bf554fa action: fix naming on import 2013-04-23 20:59:02 +02:00
Mirek Kratochvil
80fcaf5569 actions: pubkeys/secrets typo fix 2013-04-23 09:47:32 +02:00
Mirek Kratochvil
41c17cf569 README update 2013-04-23 08:56:12 +02:00
Mirek Kratochvil
b52befc547 version bump for packaging 2013-04-23 08:26:40 +02:00
Mirek Kratochvil
aa03f01530 actions: detachsign stdin/stdout support 2013-04-23 08:07:51 +02:00
Mirek Kratochvil
e19ba185b7 algos_enc: padding for hiding message length 2013-04-22 14:56:20 +02:00
Mirek Kratochvil
5633358195 README: fix 2013-04-22 13:51:10 +02:00
Mirek Kratochvil
ea984b8e52 README.md: update for github 2013-04-22 13:40:27 +02:00
Mirek Kratochvil
10d733940d actions: decrypt+verify
HAHA HA HAH
2013-04-22 13:25:28 +02:00
Mirek Kratochvil
f761fdd3a3 actions: sign+encrypt 2013-04-22 13:03:02 +02:00
Mirek Kratochvil
5e950a7a12 fmtseq: report remaining signature count 2013-04-22 12:38:27 +02:00
Mirek Kratochvil
fc163535f5 actions: verification 2013-04-22 12:30:21 +02:00
Mirek Kratochvil
fd96d76df9 actions: smarter recipient/local user search 2013-04-22 09:33:00 +02:00
Mirek Kratochvil
35f8b0477e actions: signing 2013-04-22 09:23:47 +02:00
Mirek Kratochvil
ede323e0e9 main: remove forgotten debug output 2013-04-22 09:22:56 +02:00
Mirek Kratochvil
434f9ef1fb actions: decrypt clearouts 2013-04-22 09:22:37 +02:00
Mirek Kratochvil
6e10c08b4b actions: one more check 2013-04-22 08:47:49 +02:00
Mirek Kratochvil
1880b2bb21 actions: don't leak sencode on parsing failure 2013-04-22 08:23:40 +02:00
Mirek Kratochvil
7b5206abd0 actions: decrypt 2013-04-22 08:23:16 +02:00
Mirek Kratochvil
78972b886a actions: encryption 2013-04-22 08:02:29 +02:00
Mirek Kratochvil
a5f060c7fa bvector: string/bvector conversion utility 2013-04-22 07:52:48 +02:00